cdktf-cdktf-provider-upcloud 15.6.1__py3-none-any.whl → 15.7.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (69) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +5 -3
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.7.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +9 -9
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
  7. cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +4 -4
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +22 -22
  13. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
  14. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
  15. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
  16. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -28
  17. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
  18. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
  19. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
  20. cdktf_cdktf_provider_upcloud/file_storage/__init__.py +1683 -0
  21. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +42 -42
  22. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +19 -19
  23. cdktf_cdktf_provider_upcloud/gateway/__init__.py +38 -38
  24. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
  25. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
  26. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +34 -34
  27. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +72 -72
  28. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +46 -46
  29. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +46 -46
  30. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
  31. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +25 -25
  32. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
  33. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
  34. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +228 -228
  35. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
  36. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
  37. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +28 -28
  38. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +25 -25
  39. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
  40. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +213 -213
  41. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +603 -603
  42. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +369 -369
  43. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +135 -135
  44. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +65 -65
  45. cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +138 -138
  46. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
  47. cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +10 -10
  48. cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +13 -13
  49. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
  50. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
  51. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
  52. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
  53. cdktf_cdktf_provider_upcloud/network/__init__.py +50 -50
  54. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
  55. cdktf_cdktf_provider_upcloud/provider/__init__.py +28 -28
  56. cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
  57. cdktf_cdktf_provider_upcloud/server/__init__.py +139 -139
  58. cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
  59. cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
  60. cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +13 -13
  61. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
  62. cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
  63. {cdktf_cdktf_provider_upcloud-15.6.1.dist-info → cdktf_cdktf_provider_upcloud-15.7.0.dist-info}/METADATA +5 -5
  64. cdktf_cdktf_provider_upcloud-15.7.0.dist-info/RECORD +68 -0
  65. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.6.1.jsii.tgz +0 -0
  66. cdktf_cdktf_provider_upcloud-15.6.1.dist-info/RECORD +0 -67
  67. {cdktf_cdktf_provider_upcloud-15.6.1.dist-info → cdktf_cdktf_provider_upcloud-15.7.0.dist-info}/LICENSE +0 -0
  68. {cdktf_cdktf_provider_upcloud-15.6.1.dist-info → cdktf_cdktf_provider_upcloud-15.7.0.dist-info}/WHEEL +0 -0
  69. {cdktf_cdktf_provider_upcloud-15.6.1.dist-info → cdktf_cdktf_provider_upcloud-15.7.0.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_firewall_rules`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules).
4
+ Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -44,7 +44,7 @@ class FirewallRules(
44
44
  metaclass=jsii.JSIIMeta,
45
45
  jsii_type="@cdktf/provider-upcloud.firewallRules.FirewallRules",
46
46
  ):
47
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules upcloud_firewall_rules}.'''
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules upcloud_firewall_rules}.'''
48
48
 
49
49
  def __init__(
50
50
  self,
@@ -61,12 +61,12 @@ class FirewallRules(
61
61
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
62
62
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
63
63
  ) -> None:
64
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
64
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
65
65
 
66
66
  :param scope: The scope in which to define this construct.
67
67
  :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
68
- :param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#server_id FirewallRules#server_id}
69
- :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
68
+ :param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
69
+ :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
70
70
  :param connection:
71
71
  :param count:
72
72
  :param depends_on:
@@ -106,7 +106,7 @@ class FirewallRules(
106
106
 
107
107
  :param scope: The scope in which to define this construct.
108
108
  :param import_to_id: The construct id used in the generated config for the FirewallRules to import.
109
- :param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
109
+ :param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
110
110
  :param provider: ? Optional instance of the provider where the FirewallRules to import is found.
111
111
  '''
112
112
  if __debug__:
@@ -219,8 +219,8 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
219
219
  :param lifecycle:
220
220
  :param provider:
221
221
  :param provisioners:
222
- :param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#server_id FirewallRules#server_id}
223
- :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
222
+ :param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
223
+ :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
224
224
  '''
225
225
  if isinstance(lifecycle, dict):
226
226
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -323,7 +323,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
323
323
  def server_id(self) -> builtins.str:
324
324
  '''The UUID of the server to be protected with the firewall rules.
325
325
 
326
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#server_id FirewallRules#server_id}
326
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
327
327
  '''
328
328
  result = self._values.get("server_id")
329
329
  assert result is not None, "Required property 'server_id' is missing"
@@ -335,7 +335,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
335
335
  ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]]:
336
336
  '''firewall_rule block.
337
337
 
338
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
338
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
339
339
  '''
340
340
  result = self._values.get("firewall_rule")
341
341
  return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]], result)
@@ -392,20 +392,20 @@ class FirewallRulesFirewallRule:
392
392
  source_port_start: typing.Optional[builtins.str] = None,
393
393
  ) -> None:
394
394
  '''
395
- :param action: Action to take if the rule conditions are met. Valid values ``accept | drop``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#action FirewallRules#action}
396
- :param direction: The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#direction FirewallRules#direction}
397
- :param comment: A comment for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#comment FirewallRules#comment}
398
- :param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
399
- :param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
400
- :param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
401
- :param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
402
- :param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#family FirewallRules#family}
403
- :param icmp_type: The ICMP type of the rule. Only valid if protocol is ICMP. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
404
- :param protocol: The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#protocol FirewallRules#protocol}
405
- :param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
406
- :param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
407
- :param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
408
- :param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
395
+ :param action: Action to take if the rule conditions are met. Valid values ``accept | drop``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#action FirewallRules#action}
396
+ :param direction: The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#direction FirewallRules#direction}
397
+ :param comment: A comment for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#comment FirewallRules#comment}
398
+ :param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
399
+ :param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
400
+ :param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
401
+ :param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
402
+ :param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#family FirewallRules#family}
403
+ :param icmp_type: The ICMP type of the rule. Only valid if protocol is ICMP. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
404
+ :param protocol: The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
405
+ :param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
406
+ :param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
407
+ :param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
408
+ :param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
409
409
  '''
410
410
  if __debug__:
411
411
  type_hints = typing.get_type_hints(_typecheckingstub__9b77e978fb66d25b46f06da19493b15c4f42527dec58b7335729cf86141901af)
@@ -456,7 +456,7 @@ class FirewallRulesFirewallRule:
456
456
  def action(self) -> builtins.str:
457
457
  '''Action to take if the rule conditions are met. Valid values ``accept | drop``.
458
458
 
459
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#action FirewallRules#action}
459
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#action FirewallRules#action}
460
460
  '''
461
461
  result = self._values.get("action")
462
462
  assert result is not None, "Required property 'action' is missing"
@@ -466,7 +466,7 @@ class FirewallRulesFirewallRule:
466
466
  def direction(self) -> builtins.str:
467
467
  '''The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``.
468
468
 
469
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#direction FirewallRules#direction}
469
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#direction FirewallRules#direction}
470
470
  '''
471
471
  result = self._values.get("direction")
472
472
  assert result is not None, "Required property 'direction' is missing"
@@ -476,7 +476,7 @@ class FirewallRulesFirewallRule:
476
476
  def comment(self) -> typing.Optional[builtins.str]:
477
477
  '''A comment for the rule.
478
478
 
479
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#comment FirewallRules#comment}
479
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#comment FirewallRules#comment}
480
480
  '''
481
481
  result = self._values.get("comment")
482
482
  return typing.cast(typing.Optional[builtins.str], result)
@@ -485,7 +485,7 @@ class FirewallRulesFirewallRule:
485
485
  def destination_address_end(self) -> typing.Optional[builtins.str]:
486
486
  '''The destination address range ends from this address.
487
487
 
488
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
488
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
489
489
  '''
490
490
  result = self._values.get("destination_address_end")
491
491
  return typing.cast(typing.Optional[builtins.str], result)
@@ -494,7 +494,7 @@ class FirewallRulesFirewallRule:
494
494
  def destination_address_start(self) -> typing.Optional[builtins.str]:
495
495
  '''The destination address range starts from this address.
496
496
 
497
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
497
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
498
498
  '''
499
499
  result = self._values.get("destination_address_start")
500
500
  return typing.cast(typing.Optional[builtins.str], result)
@@ -503,7 +503,7 @@ class FirewallRulesFirewallRule:
503
503
  def destination_port_end(self) -> typing.Optional[builtins.str]:
504
504
  '''The destination port range ends from this port number.
505
505
 
506
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
506
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
507
507
  '''
508
508
  result = self._values.get("destination_port_end")
509
509
  return typing.cast(typing.Optional[builtins.str], result)
@@ -512,7 +512,7 @@ class FirewallRulesFirewallRule:
512
512
  def destination_port_start(self) -> typing.Optional[builtins.str]:
513
513
  '''The destination port range starts from this port number.
514
514
 
515
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
515
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
516
516
  '''
517
517
  result = self._values.get("destination_port_start")
518
518
  return typing.cast(typing.Optional[builtins.str], result)
@@ -521,7 +521,7 @@ class FirewallRulesFirewallRule:
521
521
  def family(self) -> typing.Optional[builtins.str]:
522
522
  '''The address family of new firewall rule.
523
523
 
524
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#family FirewallRules#family}
524
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#family FirewallRules#family}
525
525
  '''
526
526
  result = self._values.get("family")
527
527
  return typing.cast(typing.Optional[builtins.str], result)
@@ -530,7 +530,7 @@ class FirewallRulesFirewallRule:
530
530
  def icmp_type(self) -> typing.Optional[builtins.str]:
531
531
  '''The ICMP type of the rule. Only valid if protocol is ICMP.
532
532
 
533
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
533
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
534
534
  '''
535
535
  result = self._values.get("icmp_type")
536
536
  return typing.cast(typing.Optional[builtins.str], result)
@@ -539,7 +539,7 @@ class FirewallRulesFirewallRule:
539
539
  def protocol(self) -> typing.Optional[builtins.str]:
540
540
  '''The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``.
541
541
 
542
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#protocol FirewallRules#protocol}
542
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
543
543
  '''
544
544
  result = self._values.get("protocol")
545
545
  return typing.cast(typing.Optional[builtins.str], result)
@@ -548,7 +548,7 @@ class FirewallRulesFirewallRule:
548
548
  def source_address_end(self) -> typing.Optional[builtins.str]:
549
549
  '''The source address range ends from this address.
550
550
 
551
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
551
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
552
552
  '''
553
553
  result = self._values.get("source_address_end")
554
554
  return typing.cast(typing.Optional[builtins.str], result)
@@ -557,7 +557,7 @@ class FirewallRulesFirewallRule:
557
557
  def source_address_start(self) -> typing.Optional[builtins.str]:
558
558
  '''The source address range starts from this address.
559
559
 
560
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
560
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
561
561
  '''
562
562
  result = self._values.get("source_address_start")
563
563
  return typing.cast(typing.Optional[builtins.str], result)
@@ -566,7 +566,7 @@ class FirewallRulesFirewallRule:
566
566
  def source_port_end(self) -> typing.Optional[builtins.str]:
567
567
  '''The source port range ends from this port number.
568
568
 
569
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
569
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
570
570
  '''
571
571
  result = self._values.get("source_port_end")
572
572
  return typing.cast(typing.Optional[builtins.str], result)
@@ -575,7 +575,7 @@ class FirewallRulesFirewallRule:
575
575
  def source_port_start(self) -> typing.Optional[builtins.str]:
576
576
  '''The source port range starts from this port number.
577
577
 
578
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
578
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
579
579
  '''
580
580
  result = self._values.get("source_port_start")
581
581
  return typing.cast(typing.Optional[builtins.str], result)
@@ -998,13 +998,13 @@ class FirewallRulesFirewallRuleOutputReference(
998
998
  @jsii.member(jsii_name="internalValue")
999
999
  def internal_value(
1000
1000
  self,
1001
- ) -> typing.Optional[typing.Union[FirewallRulesFirewallRule, _cdktf_9a9027ec.IResolvable]]:
1002
- return typing.cast(typing.Optional[typing.Union[FirewallRulesFirewallRule, _cdktf_9a9027ec.IResolvable]], jsii.get(self, "internalValue"))
1001
+ ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, FirewallRulesFirewallRule]]:
1002
+ return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, FirewallRulesFirewallRule]], jsii.get(self, "internalValue"))
1003
1003
 
1004
1004
  @internal_value.setter
1005
1005
  def internal_value(
1006
1006
  self,
1007
- value: typing.Optional[typing.Union[FirewallRulesFirewallRule, _cdktf_9a9027ec.IResolvable]],
1007
+ value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, FirewallRulesFirewallRule]],
1008
1008
  ) -> None:
1009
1009
  if __debug__:
1010
1010
  type_hints = typing.get_type_hints(_typecheckingstub__caf76bc209bb05575c5fe33f2a065f78e22a3cad53fce656b4371ab3233464d7)
@@ -1227,7 +1227,7 @@ def _typecheckingstub__b4e448528c042dda5a3679431eace4acbc8a79820637256ca64a7cb94
1227
1227
  pass
1228
1228
 
1229
1229
  def _typecheckingstub__caf76bc209bb05575c5fe33f2a065f78e22a3cad53fce656b4371ab3233464d7(
1230
- value: typing.Optional[typing.Union[FirewallRulesFirewallRule, _cdktf_9a9027ec.IResolvable]],
1230
+ value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, FirewallRulesFirewallRule]],
1231
1231
  ) -> None:
1232
1232
  """Type checking stubs"""
1233
1233
  pass
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_floating_ip_address`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address).
4
+ Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -44,7 +44,7 @@ class FloatingIpAddress(
44
44
  metaclass=jsii.JSIIMeta,
45
45
  jsii_type="@cdktf/provider-upcloud.floatingIpAddress.FloatingIpAddress",
46
46
  ):
47
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address upcloud_floating_ip_address}.'''
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address upcloud_floating_ip_address}.'''
48
48
 
49
49
  def __init__(
50
50
  self,
@@ -64,15 +64,15 @@ class FloatingIpAddress(
64
64
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
65
65
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
66
66
  ) -> None:
67
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address upcloud_floating_ip_address} Resource.
67
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address upcloud_floating_ip_address} Resource.
68
68
 
69
69
  :param scope: The scope in which to define this construct.
70
70
  :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
71
- :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#access FloatingIpAddress#access}
72
- :param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#family FloatingIpAddress#family}
73
- :param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
74
- :param release_policy: The release policy of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
75
- :param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
71
+ :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
72
+ :param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
73
+ :param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
74
+ :param release_policy: The release policy of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
75
+ :param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
76
76
  :param connection:
77
77
  :param count:
78
78
  :param depends_on:
@@ -115,7 +115,7 @@ class FloatingIpAddress(
115
115
 
116
116
  :param scope: The scope in which to define this construct.
117
117
  :param import_to_id: The construct id used in the generated config for the FloatingIpAddress to import.
118
- :param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#import import section} in the documentation of this resource for the id to use
118
+ :param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#import import section} in the documentation of this resource for the id to use
119
119
  :param provider: ? Optional instance of the provider where the FloatingIpAddress to import is found.
120
120
  '''
121
121
  if __debug__:
@@ -298,11 +298,11 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
298
298
  :param lifecycle:
299
299
  :param provider:
300
300
  :param provisioners:
301
- :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#access FloatingIpAddress#access}
302
- :param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#family FloatingIpAddress#family}
303
- :param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
304
- :param release_policy: The release policy of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
305
- :param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
301
+ :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
302
+ :param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
303
+ :param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
304
+ :param release_policy: The release policy of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
305
+ :param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
306
306
  '''
307
307
  if isinstance(lifecycle, dict):
308
308
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -414,7 +414,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
414
414
  def access(self) -> typing.Optional[builtins.str]:
415
415
  '''Network access for the floating IP address. Supported value: ``public``.
416
416
 
417
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#access FloatingIpAddress#access}
417
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
418
418
  '''
419
419
  result = self._values.get("access")
420
420
  return typing.cast(typing.Optional[builtins.str], result)
@@ -423,7 +423,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
423
423
  def family(self) -> typing.Optional[builtins.str]:
424
424
  '''The address family of the floating IP address.
425
425
 
426
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#family FloatingIpAddress#family}
426
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
427
427
  '''
428
428
  result = self._values.get("family")
429
429
  return typing.cast(typing.Optional[builtins.str], result)
@@ -432,7 +432,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
432
432
  def mac_address(self) -> typing.Optional[builtins.str]:
433
433
  '''MAC address of a server interface to assign address to.
434
434
 
435
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
435
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
436
436
  '''
437
437
  result = self._values.get("mac_address")
438
438
  return typing.cast(typing.Optional[builtins.str], result)
@@ -441,7 +441,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
441
441
  def release_policy(self) -> typing.Optional[builtins.str]:
442
442
  '''The release policy of the floating IP address.
443
443
 
444
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
444
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
445
445
  '''
446
446
  result = self._values.get("release_policy")
447
447
  return typing.cast(typing.Optional[builtins.str], result)
@@ -450,7 +450,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
450
450
  def zone(self) -> typing.Optional[builtins.str]:
451
451
  '''Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``.
452
452
 
453
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
453
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.30.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
454
454
  '''
455
455
  result = self._values.get("zone")
456
456
  return typing.cast(typing.Optional[builtins.str], result)